"Real Analysis in Computer Science" (Fall 2013) Final Program Report

Elchanan Mossel and Luca Trevisan (Organizers)

Background

Sophisticated tools in Real Analysis have played an increasingly central role in a number of areas in theoretical computer science over the past thirty years.

As a first example, the discrete Fourier expansion can be used to analyze combinatorial problems of a discrete nature using the language and techniques of real analysis. Such Fourier analysis techniques have played a key role since the 1980s in the development of computational learning theory (PAC learning) and property testing, and, in complexity theory, they have led to circuit lower bounds and to probabilistically checkable proof (PCP) constructions and hardness of approximation results.

More modern mathematical tools developed to study Banach space properties of Gaussian processes in the 1960s and 70s (in particular, the idea of hypercontractivity from functional analysis) were introduced in computer science by Kahn, Kalai and Linial in 1988. This circle of ideas played a key role in subsequent developments in coding theory, metric embeddings of graphs, and hardness of approximation of optimization problems.

Finally, concepts from Gaussian geometry and Gaussian isoperimetric theory have played an implicit role in the analysis of semi-definite programs, starting with the work of Goemans and Williamson in 1995. A rigorous theory connecting optimization problems, semi-definite programs and hardness of approximation to Gaussian geometry and isoperimetry was established in the “Unique Games” framework introduced by Khot in 2002, and was further developed via the non-linear invariance principle of Mossel, O’Donnell and Oleszkiewicz (2005) and the geometry of Gaussian space.

Goals

The principal goal of the program was to bring together mathematicians and computer scientists to study influences, measures of complexity of discrete functions, functional inequalities, invariance principles, non-classical norms, representation theory and other modern topics in mathematical analysis, and their applications to theoretical computer science. Among the participants we were delighted to have Gil Kalai and Nati Linial, both of the Hebrew University in , two of the three original pioneers in introducing sophisticated analytical methods into theoretical computer science.

Historically, connections between mathematicians and computer scientists working in the area were fruitful but slow to develop: often the computer scientists were unaware of the existing mathematical tools that were available, while symmetrically the mathematicians

17 often had no knowledge of the many interesting challenges coming from theoretical computer science to which their methods could potentially apply. The program thus sought to deepen and accelerate the connections between these different communities. Similarly, it was hoped that the opportunity for extended interaction and interplay between different communities within computer science (learning theory, hardness of approximation, coding theory, etc.) would lead to new and exciting developments.

We shall now give some examples of how the program helped build bridges across both intellectual and geographical divides among participants.

Bridging Disciplines

The program enabled some key players to interact for the first time. One of the main goals of the program was to enable collaborations between some of the mathematicians working in hypercontractivity and Gaussian geometry and the computer scientists working on applications of these topics to computational problems. The first group included distinguished mathematicians Sergey Bobkov (), Michel Ledoux (University of Toulouse) and Krzysztof Oleszkiewicz (University of Warsaw), and junior researchers such as Steve Heilman (UCLA) and Joe Neeman (UT Austin). The second group included Johan Håstad (KTH Stockholm), Gil Kalai (Hebrew University), (NYU), Guy Kindler (Hebrew University), Nati Linial (Hebrew University), Prasad Raghavendra (UC Berkeley), Alex Samorodnitsky (Hebrew University) and Luca Trevisan (Stanford) as senior participants, and Naman Agarwal (UIUC), Anindya De (UC Berkeley), Ilias Diakonikolas (University of Edinburgh), Andrew Wan (Tsinghua University) and Karl Wimmer (Duquesne University) as junior participants.

An example of an exciting result that emerged from this interaction is a paper by Joe Neeman on the topic of testing surface area [62]. In this very natural and fundamental problem, the goal is to determine whether a body has “large” or “small” surface area, using a small number of queries. Using smoothness techniques from Gaussian geometry, Neeman obtained tight results for this problem, thus solving an open question posed by Ryan O’Donnell and his collaborators who had struggled with it for more than a year and obtained only partial and much weaker results. This is exactly the kind of interaction we were hoping for: the problem of testing surface area was introduced in computer science several years ago and, while the area developed quickly, the computer scientists did not possess the mathematical tools needed to study the problem in any dimension higher than one. O’Donnell and his collaborators were the first to realize that classical results in analysis allow one to study the problem in higher dimensions, but their results were incomplete as they had a gap between the upper and lower bounds. Neeman, who is an expert on smoothness techniques on semigroups, realized that those techniques could be used to close this gap. Neeman’s paper was accepted for presentation at the ACM Symposium on Theory of Computing (STOC), one of the two premier international conferences in CS Theory, in May 2014.

In the other direction, the functional J that had been introduced by Mossel and Neeman to study robust versions of the “Majority is Stablest” theorem in theoretical computer

18 science was explored by Michel Ledoux [56], who is considered the world’s leading expert on functional inequalities. Ledoux showed how the notion of “rho convexity” used in the Mossel and Neeman proof can be implicitly extended to derive, in an elegant and general manner, many of the central modern functional inequalities, including the hypercontractive and Brascamp-Lieb inequalities.

During the semester, research fellow Anindya De, with collaborators, accelerated the development of a mathematical theory of distributions of linear and low degree polynomials on the discrete cube [23-25]. This work was motivated by classical applications in de-randomization such as finding a deterministic algorithm for approximating the fraction of satisfying assignments of different families of formula. De and collaborators later further developed these techniques, which led in turn to the resolution of a long-standing open problem on testing monotonicity in the two-sided error model. In his research report at the end of the program, De noted the important role of discussions with the mathematicians attending the program (especially with Oleszkiewicz), that allowed him to utilize the mathematical formulation of Malliavin calculus (stochastic calculus in infinite dimensions)—apparently for the first time in theoretical computer science.

In a different direction, the interaction between Karl Wimmer and Yuval Filmus (Institute for Advanced Study), as well as Guy Kindler and Elchanan Mossel—see [30-32,73]— accelerated the development of discrete analysis on non-commutative structures. This group of researchers used sophisticated mathematics, involving among other things tools from the symmetric group and association schemes, to extend real analysis techniques to slices of the cube and other non-commutative settings. These developments led, inter alia, to several novel results in extremal combinatorics.

Applications of discrete analysis to several problems in hardness of approximation and property testing were studied by Johan Håstad, Prahladh Harsha (Tata Institute, India), Dominik Scheder (Shanghai Jiao Tong University), Guy Kindler, Muli Safra (Hebrew University) and others; see, e.g., [3, 37]. Finally, Andrew Wan, Varun Kanade (UC Berkeley) and a number of workshop participants pursued applications in learning and privacy [50, 52, 71].

Bridging Geography

Naturally, the semester also fostered opportunities for extended collaboration between theoretical computer scientists working in the same area. Many of the world’s leading experts on hardness of approximation and property testing participated in the program, and multiple results were obtained by groups of experts who are geographically dispersed. The group in hardness of approximation included Prahladh Harsha (India), Johan Håstad (Sweden), Guy Kindler (), Prasad Raghavendra (Berkeley) and Muli Safra (Israel), along with a similarly geographically diverse group of young participants. Similarly, Anindya De (Berkeley), Ilias Diakonikolas (UK) and Rocco Servedio (NYU) continued to develop aspects of their computational theory of polynomials of random variables [23-26].

19 Mentoring

The semester provided excellent mentoring opportunities for the ten postdoctoral Fellows and other junior participants (mainly graduate students) in the program. According to survey responses, the average degree in the graph of collaborations was quite high (around 4.9; i.e., each participant collaborated on average with almost five others), with the younger participants having some of the higher degrees. In some cases, the mentoring took the form of a tool offering junior participants quality time with more senior participants. In other cases, it allowed focused conversations regarding career challenges and strategic research goal-setting, and in some cases sustained scientific collaboration. The overall mentoring impact of the program is well illustrated by the example of Johan Håstad: in addition to delivering an excellent expository series of lectures on hardness of approximation during the Boot Camp, he was involved in at least five research projects with the Fellows and other junior participants. His advice to junior participants on career development was commended by a number of them in their exit surveys.

Collaborations with Other Programs

We note that some very interesting collaborations took place between participants of this program and of the concurrent program on “Theoretical Foundations of Big Data Analysis”, as well as of subsequent programs at the Simons Institute. For example, analytic techniques for studying graph properties were of interest to many participants of both the Real Analysis and Big Data programs. In particular, we would like to note work by Sébastien Bubeck from the Big Data program in collaboration with Real Analysis participants Nati Linial, Elchanan Mossel and Miklós Rácz [11-12] on statistical questions regarding large graphs, graph limits, Dirichlet and Pólya processes, etc.

Gil Kalai delivered a provocative popular lecture entitled “Why Quantum Computers Cannot Work” [44-45], which preceded the following semester’s program on Quantum Hamiltonian Complexity and was attended by several participants of that program. An amazing conjecture in Information Theory due to Kumar and Courtade occupied numerous people at the Institute, and progress was made on this conjecture during the semester both by Real Analysis program participants [65] and (remotely) by participants of the subsequent Simons Institute program on Information Theory. Work in progress by Samorodnitsky initiated during the program provides the current state-of-the-art towards proving this conjecture.

Reunion Workshop, Recent Breakthroughs and Future Directions

The Reunion Workshop in December 2014 (one year after the end of the program) devoted some time to reflection on the state of the field. As an already mature field, it is natural to ask if there is much more that can be expected from it—the techniques have already been used in a number of other fields and some stubborn open problems have been open since the 1980s and 1990s.

20 A number of recent breakthroughs that took place in the wake of the program allow for a much more optimistic view on the impact of the program and the future of the field. These include the following:

1. Ronen Eldan and James Lee (both from the University of Washington) established the Gaussian case of Talagrand’s convolution conjecture (Arxiv: 1410.3887). This conjecture, which is more than 20 years old, has resisted many attempts by leading mathematicians and computer scientists. It is well known that smoothing of functions make their tails lighter. A quantitative, hypercontractive version of this statement has been very instrumental in applications of real analysis in theoretical computer science. Talagrand conjectured that such a statement holds without requiring any smoothness from the original function. As a consequence, it was clear that none of the analytical techniques in the area are applicable to the conjecture. Its resolution was based on novel ideas from Gaussian geometry that were developed by Eldan (a program participant) during the program, with the actual breakthrough coming a little later. Lee presented the work at the Reunion Workshop. We hope to see many more exciting applications of this technique in the future.

2. Given black box access to a function, how easy it is to test if it is approximately monotone? The so-called “sampling complexity of monotonicity testing” was perhaps the most central open problem in the area of property testing, and had been open since the 1990s. This question was recently resolved (http://eccc.hpi- web.de/report/2015/011/) by Khot (an organizer of the program), Dinzer and Safra (a participant in the program), based on a beautiful extension of a mathematical bound on monotone functions established by Talagrand in the 1990s. In the other direction (Arxiv: 1412.5657), a matching lower bound for the hard case of two-sided error was established by Chen, De (a fellow in the program), Servedio (a workshop participant) and Tan (a workshop participant and a fellow at the Simons Institute during the following year). This work is based on very accurate high-dimensional central limit theorems, which were one of De’s main interests as a fellow.

3. In terms of dissemination to other areas and influence on other Institute programs, we would like to note the very recent striking and elegant proof of the fact that Reed-Muller codes achieve capacity under the erasure channel (Kumar and Pfister, Arxiv:1505.05123; and independently, Kudekar, Mondelli, Sasoglu and Urbanke, Arxiv:1505.05831). This proof is based on a combination of techniques from coding theory and from analysis of Boolean functions.

21 Real Analysis in Computer Science, Fall 2013

[1] N. AGARWAL, G. KINDLER, A. KOLLA, and L. TREVISAN. Unique Games on the Hypercube. arXiv preprint arXiv:1405.1374, 2014. To appear, CJTCS. [2] N. AGARWAL, A. KOLLA, and V. MADAN. Small Lifts of Expander Graphs are Expanding. arXiv preprint arXiv:1311.3268, 2013. [3] P. AUSTRIN, V. GURUSWAMI, and J. HÅSTAD. (2 + ε)-SAT is NP-hard. Electronic Colloquium on Computational Complexity, 2013. [4] R. BARANIUK, S. FOUCART, D. NEEDELL, Y. PLAN, and M. WOOTTERS. Exponential decay of reconstruction error from binary measurements of sparse signals. arXiv preprint arXiv:1407.8246v1, 2014. [5] A. BHANGALE, P. HARSHA, and G. VARMA. A Characterization of hard-to-cover CSPs. To appear in Proc. 30th Computational Complexity Conference (CCC) (Portland, Oregon, 17-19 June). 2015. [6] A. BHANGALE, S. KOPPARTY, and S. SACHDEVA. Simultaneous Approximation of Constraint Satisfaction Problems. Electronic Colloquium on Computational Complexity (ECCC), 21, 98, 2014. [7] R. BLEI. The Grothendieck Inequality Revisited (Part 2). [8] S. BOBKOV and M. LEDOUX. One dimensional empirical measures, order statistics, and Kantorovich transport distances. Preprint, 2014. [9] J. BRODY, S. K. JAKOBSEN, D. SCHEDER, and P. WINKLER. Cryptogenography. In Proceedings of the 5th conference on Innovations in theoretical computer science, pp. 13–22, ACM, 2014. [10] J. BROWN-COHEN and P. RAGHAVENDRA. Combinatorial Optimization Algorithms via Polymorphisms. arXiv preprint arXiv:1501.01598v1, 2015. [11] S. BUBECK and N. LINIAL. On the local profiles of trees. J. Graph Theory. Accepted for publication. [12] S. BUBECK, E. MOSSEL, and M. Z. RÁCZ. On the influence of the seed graph in the preferential attachment model. arXiv preprint arXiv:1401.4849v3, 2014. To appear in IEEE Transaction on network science and engineering. [13] P. CAPUTO, G. MENZ, and P. TETALI. Approximate tensorization of entropy at high temperature. arXiv preprint arXiv:1405.0608, 2014. To be published in a special issue of Annales Fac. Sci. Toulouse. [14] S. CHAN, I. DIAKONIKOLAS, R. A. SERVEDIO, and X. SUN. Near-Optimal Density Estimation in Near- Linear Time Using Variable-Width Histograms. In NIPS, pp. 1844–1852, 2014. [15] S.-O. CHAN, I. DIAKONIKOLAS, R. A. SERVEDIO, and X. SUN. Efficient density estimation via piecewise polynomial approximation. In Proceedings of the 46th Annual ACM Symposium on Theory of Computing, pp. 604– 613, ACM, 2014. [16] S.-O. CHAN, I. DIAKONIKOLAS, G. VALIANT, and P. VALIANT. Optimal algorithms for testing closeness of discrete distributions. In Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 1193–1203, SIAM, 2014. [17] K. CHANDRASEKARAN, J. THALER, J. ULLMAN, and A. WAN. Faster private release of marginals on small databases. In Proceedings of the 5th conference on Innovations in theoretical computer science, pp. 387–402, ACM, 2014. [18] M. CHUDNOVSKY, G. KALAI, E. NEVO, I. NOVIK, and P. SEYMOUR. Bipartite Minors. arXiv preprint arXiv:1312.0210, December 2013. [19] G. COHEN, A. GANOR, and R. RAZ. Two Sides of the Coin Problem. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2014), 28, 618--629, 2014. [20] D. DACHMAN-SOLED, V. FELDMAN, L.-Y. TAN, A. WAN, and K. WIMMER. Approximate resilience, monotonicity, and the complexity of agnostic learning. In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA), 2015. [21] C. DASKALAKIS, A. DE, I. DIAKONIKOLAS, A. MOITRA, and R. A. SERVEDIO. A Polynomial-time Approximation Scheme for Fault-tolerant Distributed Storage. In Proceedings of the Twenty-Fifth Annual ACM- SIAM Symposium on Discrete Algorithms, SODA '14, pp. 628–644, SIAM, 2014. [22] R. DAVID, I. DINUR, E. GOLDENBERG, G. KINDLER, and I. SHINKAR. Direct Sum Testing. In Electronic Colloquium on Computational Complexity (ECCC), volume 21, pp. 2, 2014. [23] A. DE, I. DIAKONIKOLAS, and R. A. SERVEDIO. Deterministic Approximate Counting for Juntas of Degree-2 Polynomial Threshold Functions. In Computational Complexity (CCC), 2014 IEEE 29th Conference on, pp. 229-240, June 2014. [24] A. DE. Beyond the Central Limit Theorem: asymptotic expansions and pseudorandomness for combinatorial sums.

22 ECCC Technical report, TR14-125. [25] A. DE and R. SERVEDIO. Efficient deterministic approximate counting for low-degree polynomial threshold functions. In Proceedings of ACM Symposium on Theory of Computing, November 2014. [26] I. DIAKONIKOLAS, D. M. KANE, and V. NIKISHKIN. Testing Identity of Structured Distributions. In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 1841–1854, 2015. [27] I. DINUR, P. HARSHA, and G. KINDLER. Polynomially low error PCPs with polyloglog n queries via modular composition. To appear in Proc. 47th ACM Symp. on Theory of Computing (STOC) (Portland, Oregon, 14-17 June). 2015. [28] I. DINUR, P. HARSHA, S. SRINIVASAN, and G. VARMA. Derandomized Graph Product Results using the Low Degree Long Code. To appear in Proc. 32nd Annual Symposium on Theoretical Aspects of Computer Science (STACS) (Munich, Germany, 4-7 March). 2015. [29] M. ERBAR, J. MAAS, and P. TETALI. Discrete Ricci curvature bounds for Bernoulli-Laplace and random transposition models. arXiv preprint arXiv:1409.8605, 2014. To be published in a special issue of Annales Fac. Sci. Toulouse.. [30] Y. FILMUS, G. KINDLER, E. MOSSEL, and K. WIMMER. We are the 99%: Invariance on slices. Preprint. [31] Y. FILMUS. Friedgut–Kalai–Naor theorem for slices of the Boolean cube. Submitted. [32] Y. FILMUS. Orthogonal basis for functions over a slice of the boolean hypercube. [33] Y. FILMUS, H. HATAMI, N. KELLER, and N. LIFSHITZ. On the sum of the L1 influences of bounded functions. Submitted. [34] Y. FILMUS, H. HATAMI, N. KELLER, and N. LIFSHITZ. Bounds on the sum of L1 influences. Accepted to Israel Journal of Mathematics. [35] E. FRIEDGUT, J. KAHN, G. KALAI, and N. KELLER. Chvatal’s Conjecture and Correlation Inequalities. [36] J. GREENBLATT, A. KOLLA, and B. KRAUSE. Dimension-Free $L^p$-Maximal Inequalities in $Z_m+1^N$. arXiv preprint arXiv:1406.7229v3, 2014. [37] V. GURUSWAMI, P. HARSHA, J. HASTAD, S. SRINIVASAN, and G. VARMA. Super-polylogarithmic hypergraph coloring hardness via low-degree long codes. In Proceedings of 46th Symposium on Theory of Computing (STOC), pp. 614–623, 2014. [38] M. HAJIABADI and B. M. KAPRON. Gambling, Computational Information and Encryption Security. In Information Theoretic Security, 141–158. Springer, 2015. [39] M. HAJIABADI, B. M. KAPRON, and V. SRINIVASAN. On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes. Submitted. [40] M. HARDT and M. WOOTTERS. Fast Matrix Completion without the Condition Number. In Proceedings of the Conference on Learning Theory (COLT), 2014. [41] M. HARDT, R. MEKA, P. RAGHAVENDRA, and B. WEITZ. Computational limits for matrix completion. Computational Learning Theory, 2014. [42] S. HEILMAN, E. MOSSEL, and J. NEEMAN. Standard simplices and pluralities are not the most noise stable. In Proceedings of ITCS, 2015. To appear in Israel Journal of Mathematics. [43] S. HEILMAN, E. MOSSEL, and K. OLESZKIEWICZ. Strong Contraction and Influences in Tail Spaces. arXiv preprint arXiv:1406.7855, 2014. [44] G. KALAI. Why Quantum computers cannot work Part I. Videotaped lecture produced at the Simons Institute. [45] G. KALAI. Why Quantum computers cannot work Part II. Videotaped lecture produced at the Simons Institute. [46] G. KALAI and G. KINDLER. Gaussian Noise Sensitivity and BosonSampling. arXiv preprint arXiv:1409.3093, 2014. [47] G. KALAI and G. KUPERBERG. Contagious error sources would need time travel to prevent quantum computation. arXiv preprint arXiv:1412.1907v2, 2015. [48] G. KALAI, E. NEVO, and I. NOVIK. Bipartite rigidity. arXiv preprint arXiv:1312.0209, 2013. To appear Trans AMS. [49] G. KALAI and L. J. SCHULMAN. Littlewood-type extremal problem for multivariate polynomials. working draft. [50] V. KANADE and E. MOSSEL. MCMC Learning. arXiv preprint arXiv:1307.3617, July 2013. [51] V. KANADE, E. MOSSEL, and T. SCHRAMM. Global and Local Information in Clustering Labeled Block Models. In Proceedings of RANDOM, 2014. [52] V. KANADE and J. THALER. Distribution-Independent Reliable Learning. arXiv preprint arXiv:1402.5164, 2014.

23 [53] B. KLARTAG, G. KOZMA, P. RALLI, and P. TETALI. Discrete curvature and abelian groups. arXiv preprint arXiv:1501.00516v2, 2015. [54] G. KOL, S. MORAN, A. SHPILKA, and A. YEHUDAYOFF. Approximate Nonnegative Rank is Equivalent to the Smooth Rectangle Bound. In International Colloquium on Automata, Languages and Programming (ICALP), pp. 701–712, 2014. [55] F. KRZAKALA, C. MOORE, E. MOSSEL, J. NEEMAN, A. SLY, L. ZDEBOROVÁ, and P. ZHANG. Spectral redemption in clustering sparse networks. Proceedings of the National Academy of Sciences, 110, 52, pp. 20935– 20940, 2013. [56] M. LEDOUX. Remarks on Gaussian noise stability, Brascamp-Lieb and Slepian inequalities. Geometric aspects of functional analysis, Lecture Notes in Math, 2116, pp. 309–333, 2014. [57] A. LIVNAT, C. PAPADIMITRIOU, A. RUBINSTEIN, G. VALIANT, and A. WAN. Satisfiability and evolution. In Foundations of Computer Science (FOCS), 2014 IEEE 55th Annual Symposium on, pp. 524–530, IEEE, 2014. [58] R. MEIR, M. TENNENHOLTZ, and OTHERS. General-sum Bidding Games. arXiv preprint arXiv:1311.0913, 2013. [59] E. MOSSEL, J. NEEMAN, and A. SLY. A proof of the block model threshold conjecture. arXiv preprint arXiv: 1311.4115, 2013. [60] E. MOSSEL, J. NEEMAN, and A. SLY. Belief propagation, robust reconstruction, and optimal recovery of block models. arXiv preprint arXiv:1309.1380, 2013. JMLR Workshop and Conference Proceedings (COLT proceedings). [61] E. MOSSEL, J. NEEMAN, and A. SLY. Consistency thresholds for binary symmetric block models. arXiv preprint arXiv:1407.1591, 2014. [62] J. NEEMAN. Testing surface area with arbitrary accuracy. In Proceedings of 46th Symposium on Theory of Computing (STOC), 2014. [63] P. A. PAPAKONSTANTINOU, D. SCHEDER, and H. SONG. Overlays and Limited Memory Communication. In IEEE Conference on Computational Complexity, pp. 298–308, 2014. [64] A. RUDRA and M. WOOTTERS. Every list-decodable code for high noise has abundant near-optimal rate puncturings. In Proceedings of 46th Symposium on Theory of Computing (STOC), 2014. [65] S. SACHDEVA, A. SAMORODNITSKY, and I. SHAHAF. On Conjectures of Kumar and Courtade. Unpublished manuscript. 2015. [66] S. SACHDEVA and N. K. VISHNOI. Faster Algorithms via Approximation Theory. Foundations and Trends® in Theoretical Computer Science, 9, 2, pp. 125–210, 2014. [67] D. SCHEDER. Exponential Lower Bounds for k-SAT Algorithms. Encyclopedia of Algorithms. [68] D. SCHEDER. Inside the Simons Institute. Bulletin of EATCS, 3, 111, 2013. [69] M. SZEGEDY and Y. XU. Impossibility Theorems and the Universal Algebraic Toolkit. To be submitted to FOCS 2015. [70] A. W. T. STEINKE, S. VADHAN. Pseudorandomness and Fourier Growth Bounds for Width 3 Branching Programs. In 18th International Workshop on Randomization and Computation (RANDOM), 2014. [71] A. WAN, J. WRIGHT, and C. WU. Decision Trees, Protocols, and the Fourier Entropy-Influence Conjecture. arXiv preprint arXiv:1312.3003, 2013. [72] C. WENNER. Parity is positively useless. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques: The 17th. International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, pp. 433–448, Schloss Dagstuhl, 2014. [73] K. WIMMER. Low Influence Functions over Slices of the Boolean Hypercube Depend on Few Coordinates. In Computational Complexity (CCC), 2014 IEEE 29th Conference on, pp. 120-131, June 2014. [74] K. WIMMER, Y. WU, and P. ZHANG. Optimal query bounds for testing the trace of a matrix. In Proceedings of the International Colloquium on Automata, Languages, and Programming (ICALP), 2014.

24